NA - CVE-2023-48277 - Missing Authorization vulnerability in SuperPWA...
Missing Authorization vulnerability in SuperPWA Super Progressive Web Apps allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Super Progressive Web Apps:...
NA - CVE-2023-7298 - A maliciously crafted FBX file, when parsed...
A maliciously crafted FBX file, when parsed through Autodesk FBX SDK, may force an Out-of-Bounds Write vulnerability. A malicious actor may leverage this vulnerability to cause a crash, cause data...
NA - CVE-2024-11991 - Motoko's incremental garbage collector is...
Motoko's incremental garbage collector is impacted by an uninitialized memory access bug, caused by incorrect use of write barriers in a few locations. This vulnerability could potentially...
NA - CVE-2024-38485 - Dell ECS, versions prior to 3.8.0, contain(s) a...
Dell ECS, versions prior to 3.8.0, contain(s) a Host Header Injection Vulnerability. A remote low-privileged attacker could potentially exploit this vulnerability to trigger redirections that leads...
NA - CVE-2024-42426 - Dell PowerScale OneFS Versions 9.5.0.x through...
Dell PowerScale OneFS Versions 9.5.0.x through 9.8.0.x contain an uncontrolled resource consumption vulnerability. A low privilege remote attacker could potentially exploit this vulnerability,...
NA - CVE-2024-49600 - Dell Power Manager (DPM), versions prior to...
Dell Power Manager (DPM), versions prior to 3.17, contain an improper access control vulnerability. A low privileged attacker with local access could potentially exploit this vulnerability, leading...
NA - CVE-2024-49602 - Dell PowerScale OneFS Versions 8.2.2.x through...
Dell PowerScale OneFS Versions 8.2.2.x through 9.8.0.x contain an improper resource unlocking vulnerability. A remote low privileged attacker could potentially exploit this vulnerability, leading...
NA - CVE-2024-49603 - Dell PowerScale OneFS Versions 8.2.2.x through...
Dell PowerScale OneFS Versions 8.2.2.x through 9.9.0.x contain an incorrect specified argument vulnerability. A remote low privileged legitimate user could potentially exploit this vulnerability,...